288 GAMMA 201110 FinIntrusion Kit

Embed Size (px)

Citation preview

  • 7/29/2019 288 GAMMA 201110 FinIntrusion Kit

    1/3

    www.gammagroup.com

    Tactical IT Intrusion Portfolio

    FININTRUSION KIT

    FINFISHERit intrusion

    Feature Overview

    Discovers Wireless LANs (802.11) and Bluetooth devices

    Recovers WEP (64 and 128 bit) Passphrases within 2-5 minutes

    Breaks WPA1 and WPA2 Passphrases using Dictionary Attacks

    Actively monitors Local Area Network (Wired and Wireless) and extracts Usernames and

    Passwords even for TLS/SSL-encrypted sessions Emulates Rogue Wireless Access-Point (802.11)

    Remotely breaks into Email Accounts using Network-, System- and Password-based Intrusion Techniques

    Network Security Assessment and Validation

    For a full feature list please refer to the Product Specifications.

    FinIntrusion Kit was designed and developed by world-

    class IT Intrusion specialists, who have over 10 years ofexperience in their area through their work in several TigerTeams (Red Teams) in the private and government sector

    assessing the security of different networks and organiza-tions.

    The FinIntrusion Kit is an up-to-dateand covert operationalKit that can be used for most common IT Intrusion

    Operations in defensive and offensive areas. Currentcustomers include Military CyberWar Departments,Intelligence Agencies, Police Intelligence and otherLaw Enforcement Agencies.

    Usage Example 1: Technical Surveillance Unit

    The FinIntrusion Kit was used to break the WPA encryptionof a Targets home Wireless network and then monitorhis Webmail (Gmail, Yahoo, ) and Social Network(Facebook, MySpace, ) credentials, which enabled theinvestigators to remotely monitor these accounts fromHeadquarters without the need to be close to the Target.

    Usage Example 2: IT Security

    Several customers used the FinIntrusion Kit to successfully

    compromise the security of networks and computersystems for offensive and defensive purposes usingvarious Tools and Techniques.

    Usage Example 3: Strategic Use-Cases

    The FinIntrusion Kit is widely used to remotely gain accessto Target Email Accounts and Target Web-Servers (e.g.Blogs, Discussion Boards) and monitor their activities,

    including Access-Logs and more.

    Usage:

    Content:

    Strategic Operations

    Tactical Operations

    Hardware/Software

    Break WEP/WPA Encryption

    Network Monitoring(including SSL Sessions)

    IT Intrusion Attacks

    Capabilities:

    QUICK INFORMATION

  • 7/29/2019 288 GAMMA 201110 FinIntrusion Kit

    2/3

    Tactical IT Intrusion Portfolio

    FININTRUSION KIT

    Product Components

    FinIntrusion Kit - Covert Tactical Unit

    Basic IT Intrusion Components:

    High-Power WLAN Adapter

    High-Power Bluetooth Adapter

    802.11 Antennas

    Many Common IT Intrusion Devices

    FinTrack Operation Center

    Graphical User Interface for Automated IT Intrusion

    Attacks

    Automated LAN/WLAN Monitoring

  • 7/29/2019 288 GAMMA 201110 FinIntrusion Kit

    3/3

    Tactical IT Intrusion Portfolio

    FININTRUSION KIT

    LAN/WLAN Active Password Sniffer

    Captures even SSL-encrypted data like Webmail,

    Video Portals, Online-Banking and more